Trust is the most critical component to develop and maintain a healthy brand. Customers are more likely to trust experts, friends and relatives than marketing campaigns. That’s why it matters to deliver the experience you promise and to build a trusted community around your brand.
As marketers will need to use more personal data to power mobile and contextual experiences, we expect consumer distrust for brands to increase
No matter how quickly wearables and connected objects emerge in the next 10 years, mobility has already introduced a paradigm shift: the ability to collect and use data about individuals in the physical world. Mobility will change the nature of the data marketers can use and act upon. Data collected via mobile will be much more sensitive, more personal and more contextual. Via sensors on wearables or smartphones, marketers will access data on our bodies and our whereabouts in real-time. This represents a huge opportunity for marketers to power better marketing across all channels not just mobile. Mobile and connected objects will not only change the nature of the data marketers can access, it will also bring privacy concerns to the physical space and it risks breaking anonymization.
Together with my colleague Fatemeh Khatibloo, co-author of the report, we digged into our Technographics data to better understand consumers’ perceptions on mobile privacy. We also conducted many interviews to discuss with marketers, vendors, and regulators how they approach mobile data and privacy. Here below are a couple of facts we learnt:
Open data is critical for delivering contextual value to customers in digital ecosystems. For instance, The Weather Channel and OpenWeatherMap collect weather-related data points from millions of data sources, including the wingtips of aircraft. They could share these data points with car insurance companies. This would allow the insurers to expand their customer journey activities, such as alerting their customers in real time to warn them of an approaching hailstorm so that the car owners have a chance to move their cars to safety. Success requires making logical connections between isolated data fields to generate meaningful business intelligence.
But also trust is critical to deliver value in digital ecosystems. One of the key questions for big data is who owns the data. Is it the division that collects the data, the business as a whole, or the customer whose data is collected? Forrester believes that for data analytics to unfold its true potential and gain end user acceptance, the users themselves must remain the ultimate owner of their own data.
The development of control mechanisms that allow end users to control their data is a major task for CIOs. One possible approach could be dashboard portals that allow end users to specify which businesses can use which data sets and for what purpose. Private.me is trying to develop such a mechanism. It provides servers to which individual's information is distributed to be run by non-profit organizations. Data anonymization is another approach that many businesses are working on, despite the fact that there are limits to data anonymization as a means to ensure true privacy.
There is growing evidence of a harmonic convergence of Infrastructure and Operations (I&O) with Security and it is hardly an accident. We often view them as separate worlds, but it’s obvious that they have more in common than they have differences. I live in the I&O team here at Forrester, but I get pulled into many discussions that would be classified as “security” topics. Examples include compliance analysis of configuration data and process discipline to prevent mistakes. Similarly, our Security analysts get pulled into process discussions and other topics that encroach into Operations territory. This is as it should be.
Some examples of where common DNA between I&O and Security can benefit you and your organization are:
Gain economic benefit by cross-pollinating skills, tools, and organizational entities
Improve service quality AND security with the same actions and strategies
Learn where the two SHOULD remain separate
Combine operational NOC and security SOC monitoring into a unified command center
Develop a plan and the economic and political justifications for intelligent combinations